Lucene search

K
cveGitHub_MCVE-2023-37279
HistorySep 20, 2023 - 10:15 p.m.

CVE-2023-37279

2023-09-2022:15:13
CWE-789
CWE-770
GitHub_M
web.nvd.nist.gov
21
faktory
web dashboard
denial of service
cve-2023-37279
security vulnerability

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

33.2%

Faktory is a language-agnostic persistent background job server. Prior to version 1.8.0, the Faktory web dashboard can suffer from denial of service by a crafted malicious url query param days. The vulnerability is related to how the backend reads the days URL query parameter in the Faktory web dashboard. The value is used directly without any checks to create a string slice. If a very large value is provided, the backend server ends up using a significant amount of memory and causing it to crash. Version 1.8.0 fixes this issue.

Affected configurations

Nvd
Vulners
Vulnrichment
Node
contribsysfaktoryRange<1.8.0go
VendorProductVersionCPE
contribsysfaktory*cpe:2.3:a:contribsys:faktory:*:*:*:*:*:go:*:*

CNA Affected

[
  {
    "vendor": "contribsys",
    "product": "faktory",
    "versions": [
      {
        "version": "< 1.8.0",
        "status": "affected"
      }
    ]
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

33.2%